[Prev][Next][Index][Thread]
Second NJITES Cybersecurity Symposium, April 28, 2003
-
To: types@cis.upenn.edu
-
Subject: Second NJITES Cybersecurity Symposium, April 28, 2003
-
From: Dominic Duggan <dduggan@cs.stevens-tech.edu>
-
Date: Tue, 11 Mar 2003 16:43:53 -0500
-
Organization: Stevens Institute of Technology
-
User-Agent: Mozilla/5.0 (X11; U; Linux i386; en-US; rv:1.0.1) Gecko/20020823 Netscape/7.0
[At least 2 of the talks involve types... DD]
Second NJITES Symposium on
Cybersecurity and Trustworthy Software
Monday, April 28, 2003
Stevens Institute of Technology
Hoboken, New Jersey, USA
Symposium web site: http://www.njites.org/Symposium/
E-mail inquiries: njites-symposium@cs.stevens-tech.edu
Register for future announcements:
http://guinness.cs.stevens-tech.edu/mailman/listinfo/njites-announce
This symposium brings together researchers and practitioners, in
government, academia and industry, to discuss problems and possible
solutions in cyber security, both for e-commerce and for homeland
security. A particular emphasis of the symposium is to bring together
those interested in communications security and in end-to-end
security.
8:30-9:15 Registration and breakfast
9:15 Opening remarks
9:30-10:30 Keynote talk: Computer Security.
Ed Felten, Princeton University.
10:30-11:00 Coffee break.
11:00-11:30 Cryptology and non-computer security.
Matt Blaze, AT&T Labs-Research.
11:30-12:00 Privacy-protecting statistics computation:
theory and practice.
Rebecca Wright, Stevens Institute of Technology.
12:00-12:30 Flexible Regulation of Distributed Coalitions.
Naftaly Minsky, Rutgers University.
12:30-2:00 Lunch.
2:00-3:00 Keynote talk: Toward fixing the "compliance defects"
of public key cryptography.
Michael Reiter, Carnegie Mellon University.
3:00-3:30 Coffee break.
3:30-4:00 Dependent session types for safety
in distributed communications.
Adriana Compagnoni, Stevens Institute of Technology.
4:00-4:30 Improving security with distributed cryptography.
Tal Rabin, IBM Hawthorne Research.
4:30-5:00 Type-Based Distributed Access Control.
Tom Chothia, Stevens Institute of Technology.
5:00 Concluding remarks.